Preventing data from being submitted to a remote system in response to a malicious e-mail

a technology for preventing data from being submitted to a remote system in response to a malicious e-mail, applied in the field of computer security, can solve the problems of increasing the frequency of phishing campaigns at a dramatic and alarming rate, and the success of countermeasures to protect users from phishing

Active Publication Date: 2009-04-07
NORTONLIFELOCK INC
View PDF2 Cites 106 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0006]Methods, systems, and computer-readable media prevent data from being submitted to a remote system responsive to a malicious electronic message. An electronic message manager (100) examines (210) incoming electronic messages and determines (220) whether an incoming message comprises at least one suspect link associated with a remote system. In response to the determination (220) that the incoming message comprises at least one suspect link, the electronic message manager (100) replaces (230) each suspect link with a redirection link. In response to a user attempting (240) to connect to the remote system by clicking on the redirection link, the electronic message manager (100) directs the user to a remote analysis site for deciding (260) whether that incoming message comprises a phishing message.

Problems solved by technology

Phishing is a fraudulent activity that attempts to elicit personal, confidential, and / or financial information from unwitting victims.
The frequency of phishing campaigns is increasing at a dramatic and alarming rate.
Counter measures to protect users from phishing have achieved limited success.
Unfortunately, when a phishing attack is successful, the user believes that they are transmitting their confidential information to a reputable website, thus circumventing the intervention and causing the user to authorize the release of sensitive information to what is actually an illicit destination.
For example, there is nothing to prevent a fraudulent party from acquiring the electronic message address of Citibankhelp.com, unless that electronic message has already been reserved by Citibank or some other party.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preventing data from being submitted to a remote system in response to a malicious e-mail
  • Preventing data from being submitted to a remote system in response to a malicious e-mail
  • Preventing data from being submitted to a remote system in response to a malicious e-mail

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014]An electronic message manager 100 examines incoming electronic messages such as e-mails, instant messages, text messages following the SMS protocol, etc. to determine if they comprise at least one embedded link associated with a remote system. Each link identified by the electronic message manager 100 is replaced with a redirection link prior to the electronic message arriving to the user. When the user selects the link in an attempt to connect with the remote system, the redirection link directs the user, at least temporarily, to an analysis site where the legitimacy of the remote system associated with the original link is determined. When the legitimacy of the remote system associated with the link is found wanting, the electronic message manager 100 concludes the e-mail message is a malicious e-mail message and takes appropriate steps to prevent data from being submitted.

[0015]The electronic message manager 100 offers the following advantages over the prior art:

[0016]isola...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An electronic message manager (100) examines (210) incoming electronic messages and determines (220) whether an incoming electronic message comprises at least one suspect link associated with a remote system. In response to the determination (220) that the incoming message comprises at least one suspect link, the electronic message manager (100) replaces (230) each suspect link with a redirection link. In response to a user attempting (240) to connect to the remote system by clicking on the redirection link, the electronic message manager directs the user to a remote analysis site for deciding (260) whether that incoming message comprises a phishing message.

Description

TECHNICAL FIELD[0001]The present invention relates generally to computer security, and more particularly to preventing the submission of data in response to a malicious e-mail message.BACKGROUND ART[0002]Phishing is a fraudulent activity that attempts to elicit personal, confidential, and / or financial information from unwitting victims. Phishing generally entails sending large numbers of electronic messages that fraudulently claim to be from a legitimate organization instructing the recipient to click on a link that leads to an official-looking yet bogus website. Once there, the user is encouraged to input confidential information such as credit card, Social Security, and / or bank-account numbers. The electronic message and the bogus website typically appear authentic, and may convey a message such as “the bank has lost some records and needs to verify information.” The site typically includes an electronic form into which the user is directed to enter the requested information. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F11/00
CPCH04L12/585H04L51/12H04L63/0236H04L63/1483G06F2221/2119H04L63/1441H04L51/212
Inventor KIENZLE, DARRELLCROALL, JAMES
Owner NORTONLIFELOCK INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products